WEBINAR:On-Demand

Cloud-management security software provider Skyhigh Networks revealed Oct. 24 that it has built out its frontline platform, Cloud-Native Data Security (CNDS) framework, with three new features: Autonomous Remediation, Cloud Email DLP and something called Lightning Link.

Skyhigh’s product was developed with the idea that as enterprises move to identify, control and protect data in the cloud--and that a business world in which traditional network-centric security technologies is becoming less and less relevant--they must update their strategies to focus on securing data natively in the cloud.

To help its users meet these new cloud-scale challenges, Skyhigh has incorporated the following into its network:

Autonomous Remediation: At the average enterprise today, there are 387 cloud security incidents each month per analyst, overwhelming already maxed-out security operations center (SOC) resources. Using Autonomous Remediation, when a user performs an IT policy violation wherever they might be working–email, Slack or Microsoft OneDrive, for example–they are immediately alerted in the application and provided instructions to help quickly correct the issue. When coached to take action, Skyhigh said, users correct issues 97 percent of the time and reduce monthly reported cloud incidents from 387 to 12, freeing SOC analysts to focus on more urgent security investigations.

Further reading

Cloud Email DLP: Exchange Online is the most-used cloud application in the world. Traditional email DLP systems are not in a position to scan the email message and an attachment stored in OneDrive, thus becoming less relevant to email in a cloud world. Cloud Email DLP scans both the message and cloud attachments for DLP violations with a consistent policy across Exchange Online and OneDrive, and also other Office 365 services, such as SharePoint Online, Microsoft Teams and Yammer.

In addition to a unified DLP policy, Skyhigh also features a consistent remediation workflow across all of the sharing and collaboration that occurs natively in Office 365’s various products, in addition to other collaboration services such as Box, Dropbox, Google and Slack.

Lightning Link: There are two primary ways cloud security solutions enforce controls today–either by sitting “in-line” and intermediating the connection between the user’s device and the cloud service, or by connecting directly to the cloud service via an application protocol interface (API), Skyhigh CEO Rajiv Gupta said.

When choosing between in-line and API models, IT security teams face the “cloud security dilemma”: either choose an API model or an in-line model. The API model offers complete coverage, including natively created content and access from unmanaged devices, but which can enforce policies only after-the-fact and not in real-time. The in-line model, which enforces policies in real-time but only offers incomplete coverage, misses content created natively in the cloud, content existing in the cloud and doesn’t allow access from unmanaged devices, Gupta said.

Lightning Link solves this cloud security dilemma by providing the complete coverage of an API model with the real-time enforcement of the in-line model, Gupta said.

The new technologies, all available as of Oct. 24 in Skyhigh Security Cloud, represent a breakthrough for the fast-growing CASB market, Gupta said. Since introducing the radical idea of a single control-point for all cloud activity five years ago, Skyhigh’s CASB platform has grown to deliver security policy enforcement, automation and intelligence to billions of cloud transactions every hour, across many of the largest organizations in the world, he said.

Chris J. Preimesberger

Chris J. Preimesberger is Editor-in-Chief of eWEEK and responsible for all the publication's coverage. In his 15 years and more than 4,000 articles at eWEEK, he has distinguished himself in reporting...

Advertiser Disclosure:
Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.